Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Defense-> Cryptography » Computer Security and Cryptography

This Directory TOP
Craagle v1.9
Wepcrack-perl 0.1.0
DirLock 1.3
Cain & Abel 4.9.10
Cryptor 2
Windows Privacy Guard
openssh-4.5p1.tar.gz
openssl-0.9.8c.tar.gz
SimpleAuthority 3.3
strongswan-2.8.0.tar.bz2
Chaos Mash 3.0.001
The Cryptography and Information Security Encyclopedia
ctunnel-0.4
fiked-0.0.5
RockXP 3.0
Stega201.zip
openssh-5.6p1
strongswan-2.7.2.tar
MessenPass 1.42
CryptoLicensing For ActiveX 612119
P-Synch
openssl-0.9.7k.tar.gz
openssl-1.0.0a
strongswan-4.5.0
openca-0.9.2.5.tar.gz
Kryptor
opennhrp-0.12
CryptoSearch
cryptmount 4.1
strongswan-4.1.3.tar.bz2
alph-0.24.tar.gz
strongswan-2.7.3.tar
Search

Computer Security and Cryptography

File Size: 9009KB
Developer:
Description:     This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.
Download:   Computer Security and Cryptography

 

Sponsor Links

Sponsor Links

Share/Bookmark